default search action
ICFNDS 2017: Cambridge, UK
- Mohammad Hammoudeh, Robert M. Newman:
Proceedings of the International Conference on Future Networks and Distributed Systems, ICFNDS 2017, Cambridge, United Kingdom, July 19-20, 2017. ACM 2017, ISBN 978-1-4503-4844-7 - Zan Li:
Intelligent FH Sequence for High Security Satellite Communication: The Generation, Performance Analysis and Application. 1:1 - Julie A. McCann:
From IoT to Ephemeral Computing: Understanding Cyber-Physical Interactions. 2 - Liangxiu Han:
Towards Sustainable Smart Society: Big Data Driven Approaches. 3 - Muhammad Ali Imran:
Distributed, Autonomous and Resilient Networks: Joint RAN and Backhaul Optimisation. 4 - Motaz Daadoo, Amna Eleyan, Derar Eleyan:
Optimization Water Leakage Detection using Wireless Sensor Networks (OWLD). 5:1-5:11 - Diaa M. Uliyan, Hamid Abdullah Jalab, Abdelrahman Abuarqoub, Muhannad A. Abu-Hashem:
Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor. 6:1-6:6 - Kelvin O. O. Anoh, Bamidele Adebisi, Olamide Jogunola, Mohammad Hammoudeh:
Cooperative Hybrid Wireless-Powerline Channel Transmission for Peer-to-Peer Energy Trading and Sharing System. 7 - Yahya Atwady, Mohammad Hammoudeh:
A Survey on Authentication Techniques for the Internet of Things. 8 - Eman Yasser Daraghmi, Amna Eleyan:
An Improved Dynamic Load Balancing Algorithm applied to a Cafeteria System in a University Campus. 9:1-9:11 - Afnan Aloraini, Mohammad Hammoudeh:
A Survey on Data Confidentiality and Privacy in Cloud Computing. 10:1-10:7 - Beatrice Rossi, Marco Patanè, Pasqualina Fragneto, Andrea Fusiello:
Robust Localization in Wireless Sensor Networks via Low-rank and 'Sparse Matrix Decomposition. 11:1-11:10 - Gökçe Çaylak Kayaturan, Alexei Vernitski:
Encoding Shortest Paths in Triangular Grids for Delivery Without Errors. 12:1-12:5 - Yousef-Awwad Daraghmi, Motaz Daadoo, Derar Eleyan:
User Centered Method for Enhancing the Adoption of Software Systems in Palestine. 13:1-13:11 - Muhannad A. Abu-Hashem, Diaa M. Uliyan, Abdelrahman Abuarqoub:
A Shared Memory Method For Enhancing The HTNGH AlgorithmPerformance: Proposed Method. 14:1-14:6 - Sahrish Khan Tayyaba, Munam Ali Shah, Omair Ahmad Khan, Abdul Wahab Ahmed:
Software Defined Network (SDN) Based Internet of Things (IoT): A Road Ahead. 15:1-15:8 - Chenxi Li, Zan Li, Lei Guan, Peihan Qi, Jiangbo Si, Benjian Hao:
Measuring the Complexity of Chaotic Time Series by Fuzzy Entropy. 16:1-16:7 - Jie Jiang, Riccardo Pozza, Kristrún Gunnarsdóttir, Nigel Gilbert, Klaus Moessner:
Recognising Activities at Home: Digital and Human Sensors. 17:1-17:11 - Ahmed Qaddus, Saleem Aslam, Abid Ali Minhas, Abdulaziz S. Almazyad:
5G Hetrogeneous Cellular Networks a Viable Mode for Implementing Future Smart Grid Networks. 18 - Mai Alfawair:
A Cloud Storage Architecture for High Data Availability, Reliability, and Fault-tolerance. 19:1-19:6 - Marwa Boulakbech, Nizar Messai, Yacine Sam, Thomas Devogele, Mohammad Hammoudeh:
IoT Mashups: From IoT Big Data to IoT Big Service. 20 - Majdi M. Mafarja, Derar Eleyan, Salwani Abdullah, Seyedali Mirjalili:
S-Shaped vs. V-Shaped Transfer Functions for Ant Lion Optimization Algorithm in Feature Selection Problem. 21:1-21:7 - Abdelhamied A. Ateya, Ammar Muthanna, Irina A. Gudkova, Anastasia Vybornova, Andrey Koucheryavy:
Intelligent core network for Tactile Internet system. 22:1-22:6 - Ammar Muthanna, Abdukodir Khakimov, Irina A. Gudkova, Alexander Paramonov, Andrei Vladyko, Ruslan Kirichek:
OpenFlow switch buffer configuration method. 23:1-23:5 - Hatem Hassan, Ahmad Mostafa, Ahmed Shawish:
ESSAC: Enhanced Scalable Secure Access Control Framework for Cloud Storage. 24:1-24:8 - Imad Ez-Zazi, Mounir Arioua, Ahmed El Oualkadi, Younes el Assari:
Joint FEC/CRC coding scheme for energy constrained IOT devices. 25:1-25:8 - Younes el Assari, Mounir Arioua, Ahmed El Oualkadi, Imad Ez-Zazi:
Zone Divisional Approach for Energy Balanced Clustering Protocol in Wireless Sensor Network. 26:1-26:7 - Ibrahim Ghafir, Vaclav Prenosil, Mohammad Hammoudeh, Liangxiu Han, Umar Raza:
Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence. 27 - Youness Riouali, Laila Benhlima, Slimane Bah:
Toward a Global WSN-Based System to Manage Road Traffic. 28:1-28:6 - Pablo C. Calcina-Ccori, Laisa Caroline de Paula Costa, Geovane Fedrecheski, John Esquiagola, Marcelo Zuffo, Flávio S. Corrêa da Silva:
Agile servient integration with the Swarm: Automatic code generation for nodes in the Internet of Things. 30:1-30:6 - Mohammad Saleh, Jaafar Gaber, Maxime Wack:
Sensor Networks Applications Performance Measures for IEEE802.11n WiFi Security Protocols. 31:1-31:4 - Levis Zerpa:
The Message-Passing Interface and Parallel SAT-Solvers. 32:1-32:7 - Monther Aldwairi, Hesham H. Alsaadi:
FLUKES: Autonomous Log Forensics, Intelligence and Visualization Tool. 33:1-33:6 - Steve Moffat, Mohammad Hammoudeh, Robert Hegarty:
A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT. 34 - S. D. Zhi, Y. B. Wei, Z. H. Yu:
Air Quality Monitoring Platform based on Remote Unmanned Aerial Vehicle with Wireless Communication. 35:1-35:7 - Z. H. Yu, Y. B. Wei, S. D. Zhi:
The design and application of information management system for precast concretes based on IOT. 36:1-36:4 - Umar Raza, James Lomax, Ibrahim Ghafir, Rupak Kharel, Ben Whiteside:
An IoT and business processes based approach for the monitoring and control of high value-added manufacturing processes. 37:1-37:8 - Adam Coates, Mohammad Hammoudeh, Kieran Gerard Holmes:
Internet of Things for Buildings Monitoring: Experiences and Challenges. 38 - J. K. Mohsin, Liangxiu Han, Mohammad Hammoudeh, Robert Hegarty:
Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments. 39:1-39:10 - Kieran Gerard Holmes, Adam Coates, Mohammad Hammoudeh:
Motion Capture Using the Internet of Things Technology: A Tutorial. 40 - Sobia Arshad, Muhammad Awais Azam, Syed Hassan Ahmed, Jonathan Loo:
Towards Information-Centric Networking (ICN) Naming for Internet of Things (IoT): The Case of Smart Campus. 41:1-41:6 - Syed Bilal Hussain Shah, Fuliang Yin, Inam Ullah Khan, Zhe Chen, Muhammad Zakarya:
Collating and Analysing State-of-the-Art Hierarchical Routing Protocols in WSN to Increase Network Lifetime and Conserve Energy. 42:1-42:10 - Umber Noreen, Ahcène Bounceur, Laurent Clavier:
Modeling Interference for Wireless Sensor Network Simulators. 43:1-43:6 - Peter Barker, Mohammad Hammoudeh:
A Survey on Low Power Network Protocols for the Internet of Things and Wireless Sensor Networks. 44:1-44:8 - Samia Bouyakoub, Abdelkader Belkhir, Fayçal M'hamed Bouyakoub, Wassila Guebli:
Smart airport: an IoT-based Airport Management System. 45:1-45:7 - Musa Abubakar Muhammad, Aladdin Ayesh, Pooneh Bagheri Zadeh:
Developing an Intelligent Filtering Technique for Bring Your Own Device Network Access Control. 46:1-46:8 - Mazhar Hussain Malik, Abdul Majeed, Mehmet Emin Aydin, Mubasher Hussain Malik:
A Parametric Study for Congestion Control in Queuing Networks. 47 - Nicolas Velasquez, Camilo Medina, Diego M. Castro, Juan Camilo Acosta, Diego Mendez:
Design and Development of an IoT System Prototype for Outdoor Tracking. 48:1-48:6 - Camilo Rodriguez, Diego M. Castro, William Coral Cuellar, Jose L. Cabra, Nicolas Velasquez, Julián Colorado, Diego Mendez, Luis Carlos Trujillo Arboleda:
IoT system for Human Activity Recognition using BioHarness 3 and Smartphone. 49:1-49:7 - Abdelrahman Abuarqoub, Hesham Abusaimeh, Mohammad Hammoudeh, Diaa M. Uliyan, Muhannad A. Abu-Hashem, Sharefa Murad, Mudhafar M. Al-Jarrah, Fayez Al-Fayez:
A Survey on Internet of Thing Enabled Smart Campus Applications. 50:1-50:7 - Hadeel Samara, Sharefa Murad, Abdallah Qusef, Abdelrahman Abuarqoub:
Backshoring: Main Drives and Effects. 51:1-51:5 - Jibran Saleem, Bamidele Adebisi, Ruth Ande, Mohammad Hammoudeh:
A state of the art survey - Impact of cyber attacks on SME's. 52 - Muath Sabha, Jacquleen Joubran Abu Daoud:
Adaptive Camera Placement for Open Heritage Sites. 53:1-53:7 - Mudhafar M. Al-Jarrah, Zaid H. Al-Taie, Abdelrahman Abuarqoub:
Steganalysis Using LSB-Focused Statistical Features. 54:1-54:5 - Kelvin O. O. Anoh, Bamidele Adebisi, Mohammad Hammoudeh:
A Comparison of ICF and Companding for Impulsive Noise Mitigation in Powerline Communication Systems. 55:1-55:6 - Asad Ali Khan, Majid Hussain, M. Zafrullah, M. Sultan Zia:
A Convergence Time Optimization Paradigm for OSPF based Networks Through SDN SPF Protocol Computer Communications and Networks (CCN)/Delay Tolerant Networks. 56:1-56:6 - Muhammad Asif Habib, Mudassar Ahmad, Nasir Mahmood, Rehan Ashraf:
An Evaluation of Role Based Access Control Towards Easier Management Compared to Tight Security. 57:1-57:6 - Ulfat Imdad, Muhammad Asif Habib, Mudassar Ahmad, Nasir Mahmood, Rehan Ashraf:
Auto Configuration Based Enhanced and Secure Domain Naming Service for IPV-6 Internet of Things. 58:1-58:5 - Muhammad Yasir, Muhammad Asif Habib, Muhammad Shahid, Mudassar Ahmad:
Agent-based Modeling and Simulation of Virus on a Scale-Free Network. 59:1-59:6 - Muhammad Naeem, Rehan Ashraf, Nouman Ali, Mudassar Ahmad, Muhammad Asif Habib:
Bottom up Approach for Better Requirements Elicitation. 60:1-60:4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.